Kenneth Paterson: Katalogdaten im Frühjahrssemester 2022

Auszeichnung: Die Goldene Eule
NameHerr Prof. Dr. Kenneth Paterson
Institut f. Informationssicherheit
ETH Zürich, CAB E 79
Universitätstrasse 6
8092 Zürich
Telefon+41 44 632 32 52
BeziehungOrdentlicher Professor

252-0211-00LInformation Security Information 8 KP4V + 3UD. Hofheinz, S. Krstic, K. Paterson, J. L. Toro Pozo
KurzbeschreibungThis course provides an introduction to Information Security. The focus
is on fundamental concepts and models, basic cryptography, protocols and system security, and privacy and data protection. While the emphasis is on foundations, case studies will be given that examine different realizations of these ideas in practice.
LernzielMaster fundamental concepts in Information Security and their
application to system building. (See objectives listed below for more details).
Inhalt1. Introduction and Motivation (OBJECTIVE: Broad conceptual overview of information security) Motivation: implications of IT on society/economy, Classical security problems, Approaches to
defining security and security goals, Abstractions, assumptions, and trust, Risk management and the human factor, Course verview. 2. Foundations of Cryptography (OBJECTIVE: Understand basic
cryptographic mechanisms and applications) Introduction, Basic concepts in cryptography: Overview, Types of Security, computational hardness, Abstraction of channel security properties, Symmetric
encryption, Hash functions, Message authentication codes, Public-key distribution, Public-key cryptosystems, Digital signatures, Application case studies, Comparison of encryption at different layers, VPN, SSL, Digital payment systems, blind signatures, e-cash, Time stamping 3. Key Management and Public-key Infrastructures (OBJECTIVE: Understand the basic mechanisms relevant in an Internet context) Key management in distributed systems, Exact characterization of requirements, the role of trust, Public-key Certificates, Public-key Infrastructures, Digital evidence and non-repudiation, Application case studies, Kerberos, X.509, PGP. 4. Security Protocols (OBJECTIVE: Understand network-oriented security, i.e.. how to employ building blocks to secure applications in (open) networks) Introduction, Requirements/properties, Establishing shared secrets, Principal and message origin authentication, Environmental assumptions, Dolev-Yao intruder model and
variants, Illustrative examples, Formal models and reasoning, Trace-based interleaving semantics, Inductive verification, or model-checking for falsification, Techniques for protocol design,
Application case study 1: from Needham-Schroeder Shared-Key to Kerberos, Application case study 2: from DH to IKE. 5. Access Control and Security Policies (OBJECTIVES: Study system-oriented security, i.e., policies, models, and mechanisms) Motivation (relationship to CIA, relationship to Crypto) and examples Concepts: policies versus models versus mechanisms, DAC and MAC, Modeling formalism, Access Control Matrix Model, Roll Based Access Control, Bell-LaPadula, Harrison-Ruzzo-Ullmann, Information flow, Chinese Wall, Biba, Clark-Wilson, System mechanisms: Operating Systems, Hardware Security Features, Reference Monitors, File-system protection, Application case studies 6. Anonymity and Privacy (OBJECTIVE: examine protection goals beyond standard CIA and corresponding mechanisms) Motivation and Definitions, Privacy, policies and policy languages, mechanisms, problems, Anonymity: simple mechanisms (pseudonyms, proxies), Application case studies: mix networks and crowds. 7. Larger application case study: GSM, mobility
263-4651-00LCurrent Topics in Cryptography Information Belegung eingeschränkt - Details anzeigen
Number of participants limited to 24.

The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.
2 KP2SD. Hofheinz, U. Maurer, K. Paterson
KurzbeschreibungIn this seminar course, students present and discuss a variety of recent research papers in Cryptography.
LernzielIndependent study of scientific literature and assessment of its contributions as well as learning and practicing presentation techniques.
InhaltThe course lecturers will provide a list of papers from which students will select.
LiteraturThe reading list will be published on the course website.
Voraussetzungen / BesonderesIdeally, students will have taken the D-INFK Bachelors course “Information Security" or an equivalent course at Bachelors level. Ideally, they will have attended or will attend in parallel the Masters course in "Applied Cryptography”.
263-4660-00LApplied Cryptography Information Belegung eingeschränkt - Details anzeigen
Number of participants limited to 150.
8 KP3V + 2U + 2PK. Paterson
KurzbeschreibungThis course will introduce the basic primitives of cryptography, using rigorous syntax and game-based security definitions. The course will show how these primitives can be combined to build cryptographic protocols and systems.
LernzielThe goal of the course is to put students' understanding of cryptography on sound foundations, to enable them to start to build well-designed cryptographic systems, and to expose them to some of the pitfalls that arise when doing so.
InhaltBasic symmetric primitives (block ciphers, modes, hash functions); generic composition; AEAD; basic secure channels; basic public key primitives (encryption,signature, DH key exchange); ECC; randomness; applications.
LiteraturTextbook: Boneh and Shoup, “A Graduate Course in Applied Cryptography”,
Voraussetzungen / BesonderesStudents should have taken the D-INFK Bachelor's course “Information Security" (252-0211-00) or an alternative first course covering cryptography at a similar level. / In this course, we will use Moodle for content delivery:
363-1153-00LNew Technologies in Banking and Finance3 KP2VB. J. Bergmann, P. Cheridito, H. Gersbach, P. Kammerlander, P. Mangold, K. Paterson, J. Teichmann, R. Wattenhofer
KurzbeschreibungTechnological advances, digitization and the ability to store and process vast amounts of data has changed the landscape of financial services in recent years. This course will unpack these innovations and technologies underlying these transformations and will reflect on the impacts on the financial markets.
LernzielAfter taking this course, students will be able to
- Understand recent technological developments in financial services and how they drive transformation
- Understand the challenges of this digital transformation when managing financial and non-financial risks
- Reflect on the impacts this transformation has on workflows, agile working, project and change management
InhaltThe financial manager of the future is commanding a wide set of skills ranging from a profound understanding of technological advances and a sensible understanding of the impact on workflows and business models. Students with an interest in finance and banking are invited to take the course without explicit theoretical knowledge in financial economics. As the course will cover topics like machine learning, cyber security, distributed computing, and more, an understanding of these technologies is welcomed, however not mandatory. The course will also go beyond technological advances and will also cover management-related contents. The course is divided in sections, each covering different areas and technologies. Students are asked to solve online quizzes and small cases for each section. Invited guest speakers will contribute to the sessions. In addition, separate networking sessions will provide entry opportunities into finance and banking.

More information on the speakers and specific session can be found here: and on the moodle page.
SkriptThere will lecture slides to each section shared in advanced to each session.
LiteraturSelected readings and books are presented in each session.
Voraussetzungen / BesonderesThe course is opened to students from all backgrounds. Some experience with quantitative disciplines such as probability and statistics, however, is useful but not mandatory.
364-1058-00LRisk Center Seminar Series0 KP2SH. Schernberg, D. Basin, A. Bommier, D. N. Bresch, S. Brusoni, L.‑E. Cederman, P. Cheridito, F. Corman, H. Gersbach, C. Hölscher, K. Paterson, G. Sansavini, D. Sornette, B. Stojadinovic, B. Sudret, J. Teichmann, R. Wattenhofer, U. A. Weidmann, S. Wiemer, M. Zeilinger, R. Zenklusen
KurzbeschreibungIn this series of seminars, invited speakers discuss various topics in the area of risk modelling, governance of complex socio-economic systems, managing risks and crises, and building resilience. Students, PhD students, post-docs, faculty and individuals outside ETH are welcome.
LernzielParticipants gain insights in a broad range of risk- and resilience-related topics. They expand their knowledge of the field and deepen their understanding of the complexity of our social, economic and engineered systems. For young researchers in particular, the seminars offer an opportunity to learn academic presentation skills and to network with an interdisciplinary scientific audience.
InhaltAcademic presentations from ETH faculty as well as external researchers.
Each seminar is followed by a Q&A session and (when permitted) a networking Apéro.
SkriptThe sessions are recorded whenever possible and posted on the ETH Risk Center webpage. If available, presentation slides are shared as well.
LiteraturEach speaker will provide a literature review.
Voraussetzungen / BesonderesIn most cases, a quantitative background is required. Depending on the topic, field-specific knowledge may be required.
Fachspezifische KompetenzenKonzepte und Theoriengefördert
Verfahren und Technologiengefördert
Methodenspezifische KompetenzenAnalytische Kompetenzengefördert
Medien und digitale Technologiengefördert
Soziale KompetenzenKommunikationgefördert
Kooperation und Teamarbeitgefördert
Menschenführung und Verantwortunggefördert
Selbstdarstellung und soziale Einflussnahmegefördert
Sensibilität für Vielfalt gefördert
Persönliche KompetenzenAnpassung und Flexibilitätgefördert
Kreatives Denkengefördert
Kritisches Denkengefördert
Integrität und Arbeitsethikgefördert
Selbstbewusstsein und Selbstreflexion gefördert
Selbststeuerung und Selbstmanagement gefördert